27.02.2013 Views

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

(PVS) Signatures - Tenable Network Security

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Description: Synopsis :\n\nThe remote host is vulnerable to a directory traversal flaw.\n\nThe remote<br />

host is running Keene Digital Media Server, a web application for Microsoft Windows<br />

designed to share media files on the Internet. The version installed on the remote host has<br />

been reported to be prone to a directory traversal issue. An attacker may gain read access<br />

on files outside the web root.<br />

Solution: Upgrade or patch according to vendor recommendations.<br />

CVE Not available<br />

Keene Digital Media Server < 1.0.4 Directory Traversal and Authentication Bypass<br />

<strong>PVS</strong> ID: 2165 FAMILY: Web Servers<br />

RISK:<br />

MEDIUM<br />

NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is vulnerable to multiple attack vectors.\n\nThe remote host<br />

is running Keene Digital Media Server, a web application for Microsoft Windows designed<br />

to share media files on the Internet. The version installed on the remote host has been<br />

reported prone to several vulnerabilities including a directory traversal issue and an<br />

authentication bypass issue. An attacker may gain read access on files outside the web root<br />

or access the administrative module without authentication.<br />

Solution: Upgrade to version 1.0.4 or higher.<br />

CVE-2004-2419<br />

Webmatic < 1.9.0 Multiple Vulnerabilities<br />

<strong>PVS</strong> ID: 2166 FAMILY: CGI RISK: HIGH NESSUS ID:Not Available<br />

Description: Synopsis :\n\nThe remote host is missing a critical security patch or upgrade.\n\nThe<br />

remote host is running Webmatic, a web portal application. It is reported that this version of<br />

Webmatic is prone to several unknown security issues.<br />

Solution: Upgrade to Webmatic 1.9.0 or higher.<br />

CVE Not available<br />

HastyMail HTML Attachment Content-Disposition Header XSS<br />

<strong>PVS</strong> ID: 2167 FAMILY: Web Servers<br />

Passive Vulnerability Scanner (<strong>PVS</strong>) <strong>Signatures</strong><br />

RISK:<br />

MEDIUM<br />

NESSUS ID:14370<br />

Description: Synopsis :\n\nThe remote host is vulnerable to a Script Injection attack.\n\nThe remote host<br />

is running HastyMail, a PHP-based mail client application. There is a flaw in the remote<br />

version of this software that may allow an attacker to execute arbitrary javascript code on<br />

the hosts of users of this software. To exploit this flaw, an attacker would need to send an<br />

email to a victim using HastyMail containing a malicious HTML attachment. When the<br />

victim attempts to read the attachment, a web browser may attempt to render the HTML<br />

file. An attacker may use this flaw to steal the cookies of the victim and therefore get<br />

access to their mailbox or perform other attacks.<br />

Family Internet Services 541

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!